Application Control Application Control

Browse the Fortiguard Labs extensive encyclopedia of applications. Click any title to view more details of the application. Can't find what you are looking for? Try using the search bar above to find a specific application description.

This indicates an attempt to send an N-CREATE request command via DICOM.Digital Imaging and Communications in Medicine (DICOM)...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to send an N-GET request command via DICOM.Digital Imaging and Communications in Medicine (DICOM) is...

Jan 25, 2013 RISK: POPULARITY:
This indicates an attempt to use the RIPng protocol.Routing Information Protocol next generation (RIPng) is the routing protocol...

Nov 03, 2011 RISK: POPULARITY:
This indicates an attempt to use the OUCH protocol.The OUCH protocol is composed of logical messages passed between an OUCH host...

Aug 17, 2011 RISK: POPULARITY:
This indicates an attempt to use the OWAMP Control protocol.The One-Way Active Measurement Protocol (OWAMP) is used to determine...

Aug 10, 2011 RISK: POPULARITY:
This indicates an attempt to use the RMI-IIOP protocol.RMI over IIOP (RMI-IIOP) is a protocol which delivers Common Object Request...

Jan 20, 2011 RISK: POPULARITY:
This indicates an attempt to access klogind.Klogind is the server for the rlogin program. The server is based on rlogind but uses...

Jan 15, 2009 RISK: POPULARITY:
This indicates an attempt to use the Sun RPC protocol with user-specified program numbers.Open Network Computing (ONC) Remote...

Jan 15, 2009 RISK: POPULARITY:
This indicates an attempt to use the CRTP protocol.CRTP is the acronym for Combat Radio Transport Protocol. It has the ID number...

Jan 13, 2009 RISK: POPULARITY:
This indicates an attempt to use the Wake-on-LAN protocol.Wake-on-LAN is a protocol developed by AMD and Hewlett Packard for remotely...

Jan 24, 2017 RISK: POPULARITY:
This indicates an attempt to use the BFD protocol.Bi-directional Forwarding Detection (BFD) is a networking standard that provides...

Jun 18, 2013 RISK: POPULARITY:
This indicates an attempt to use the AS2 protocol.Applicability Statement 2 (AS2) is the communication standard use to securely...

Mar 29, 2012 RISK: POPULARITY:
This indicates an attempt to use SoupTCP protocol.The SoupTCP protocol is composed of logical messages passed between a host and...

Aug 24, 2011 RISK: POPULARITY:
This indicates an attempt to use the H.248 protocol.The Gateway Control Protocol (H.248, Megaco) is a protocol for providing telecommunication...

Aug 10, 2011 RISK: POPULARITY:
This indicates an attempt to use the FTP protocol.File Transfer Protocol (FTP) is a protocol that allows users to exchange files...

Jan 15, 2009 RISK: POPULARITY: